Security

  • Another Record Year for Vulnerabilities … Time to Join the CIA?

    No, not that CIA. I mean the security concept known as the CIA Triad that refers to Confidentiality, Integrity and Availability.

    Read Article
  • OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol

    The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).

    Read Article
  • "Zero Touch" IoT Security Is Key to Continued Growth

    "Zero Touch" IoT Security Is Key to Continued Growth

    By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...

    Download PDF
  • IoT Security (Finally) Delivers ROI

    IoT Security (Finally) Delivers ROI

    To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...

    Download PDF
  • Securing the IIoT with Flexible Firewalls

    Securing the IIoT with Flexible Firewalls

    Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...

    Download PDF
  • A 4-Step Guide to Security Assurance for IoT Devices

    A 4-Step Guide to Security Assurance for IoT Devices

    Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”

    Download PDF
  • Containerized Linux: The Secret to IoT Security

    Containerized Linux: The Secret to IoT Security

    A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.

    Download PDF
  • Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs6:22

    Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs

    Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi

    Watch Video
  • Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon5:59

    Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon

    The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,

    Watch Video
  • So, How Secure are your Coding Practices? Ask AdaCore5:53

    So, How Secure are your Coding Practices? Ask AdaCore

    Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve

    Watch Video
  • IAR Systems leads the way for secure IoT development based on Arm TrustZone and Arm Cortex-M

    The leading independent Arm tools provider enables companies to go to market early with robust, secure IoT products

    Read Article
  • Significance of Certified Ethical Hacker (CEH) Training and Certification

    In order to save your company from online hackers, the significance of becoming a Certified Ethical Hacker (CEH) is gaining momentum around the world.

    Read Article
  • Software Development Life Cycle Stages When Getting Started on a New Idea

    When you work in the software industry, you're likely aware of how open, flexible and innovative the market is.

    Read Article
  • 2018 Top Embedded Innovator – Allison Clift Jennings, CEO, Filament6:03

    2018 Top Embedded Innovator – Allison Clift Jennings, CEO, Filament

    Blockchain and distributed ledger technology is poised to change the secure networking landscape for distributed systems of all types. Allison Clift-Jennings, CEO of Filament, gives her thoughts.

    Watch Video
  • Security must remain effective throughout a product’s entire lifetime

    The Timesys TRST technology reduces the attack surface of an embedded system.

    Read Article
  • Free or not free; that is the question

    There really are no free development tools. Here’s what you need to consider when choosing development tools for your next project.

    Read Article
  • AdaCore Technologies for cyber security, part 2: The challenge of secure software

    This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.

    Read Article
  • AdaCore Technologies for cyber security, part 1

    We're all serious about security, some more than others. This first in a series of articles on cyber-security shows that it's really necessary and it's really possible to be secure.

    Read Article
  • Cybersecurity for Automobiles: BlackBerry’s 7-Pillar Recommendation

    Cybersecurity for Automobiles: BlackBerry’s 7-Pillar Recommendation

    As vehicles become increasingly connected and reliant on software, new threats emerge. To address these concerns, help mitigate security risks, and build the foundation for a reliable and secure car,

    Download PDF
  • IoT Design Guide 2018

    IoT Design Guide 2018

    With increasing desire to move more intelligence and connectivity closer to the edge of Internet of Things networks, industry is pushing through the fog and towards mist computing.

    Download PDF
  • loading
    Loading More...